Page 551 of 2833 results (0.020 seconds)

CVSS: 4.0EPSS: 1%CPEs: 139EXPL: 0

Race condition in run_posix_cpu_timers in Linux kernel before 2.6.16.21 allows local users to cause a denial of service (BUG_ON crash) by causing one CPU to attach a timer to a process that is exiting. Condición de carrera en run_posix_cpu_timers en el kernel Linux anterior a v2.6.16.21 permite a usuarios locales provocar una denegación de servicio (caída BUG_ON) provocando que una CPU asocie un temporizador a un proceso que está saliendo. • http://marc.info/?l=linux-kernel&m=115015841413687 http://secunia.com/advisories/20703 http://secunia.com/advisories/20831 http://secunia.com/advisories/20991 http://secunia.com/advisories/21045 http://secunia.com/advisories/21179 http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=30f1e3dd8c72abda343bcf415f7d8894a02b4290 http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.16.21 http://www.mandriva.com/security/advisories?name=MDKSA-2006:12 •

CVSS: 5.6EPSS: 1%CPEs: 138EXPL: 0

Linux kernel before 2.6.16.21 and 2.6.17, when running on PowerPC, does not perform certain required access_ok checks, which allows local users to read arbitrary kernel memory on 64-bit systems (signal_64.c) and cause a denial of service (crash) and possibly read kernel memory on 32-bit systems (signal_32.c). kernel de Linux anterior a v2.6.16.21 y v2.6.17, cuando se ejecuta en PowerPC, no realiza correctamente ciertas comprobaciones requeridas access_ok, que permite a usuarios locales leer memoria del kernel de su elección en sistemas 64-bit (signal_64.c) y provoca una denegación de servicio (caída) y posibilita leer memorial del kernet en sistemas 32-bit (signal_32.c). • http://secunia.com/advisories/20703 http://secunia.com/advisories/20831 http://secunia.com/advisories/20991 http://secunia.com/advisories/21179 http://secunia.com/advisories/21465 http://secunia.com/advisories/21498 http://secunia.com/advisories/22417 http://support.avaya.com/elmodocs2/security/ASA-2006-200.htm http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7c85d1f9d358b24c5b05c3a2783a78423775a080 http://www.kernel.org/pub/linux/kernel/v2.6 •

CVSS: 7.8EPSS: 87%CPEs: 172EXPL: 1

The snmp_trap_decode function in the SNMP NAT helper for Linux kernel before 2.6.16.18 allows remote attackers to cause a denial of service (crash) via unspecified remote attack vectors that cause failures in snmp_trap_decode that trigger (1) frees of random memory or (2) frees of previously-freed memory (double-free) by snmp_trap_decode as well as its calling function, as demonstrated via certain test cases of the PROTOS SNMP test suite. • https://www.exploit-db.com/exploits/1880 http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.16.18 http://secunia.com/advisories/20182 http://secunia.com/advisories/20225 http://secunia.com/advisories/20716 http://secunia.com/advisories/21035 http://secunia.com/advisories/21136 http://secunia.com/advisories/21179 http://secunia.com/advisories/21498 http://secunia.com/advisories/21605 http://secunia.com/advisories/21983 http://secunia.com/advisories/22082 http:&#x •

CVSS: 9.0EPSS: 10%CPEs: 135EXPL: 0

Buffer overflow in SCTP in Linux kernel before 2.6.16.17 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a malformed HB-ACK chunk. • http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.16.17 http://secunia.com/advisories/20185 http://secunia.com/advisories/20671 http://secunia.com/advisories/20716 http://secunia.com/advisories/20914 http://secunia.com/advisories/21045 http://secunia.com/advisories/21179 http://secunia.com/advisories/21465 http://secunia.com/advisories/21476 http://secunia.com/advisories/21498 http://secunia.com/advisories/22417 http://support.avaya.com/elmodocs2/security/ASA-2006 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.8EPSS: 10%CPEs: 135EXPL: 0

SCTP in Linux kernel before 2.6.16.17 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a chunk length that is inconsistent with the actual length of provided parameters. • http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.16.17 http://secunia.com/advisories/20185 http://secunia.com/advisories/20671 http://secunia.com/advisories/20716 http://secunia.com/advisories/20914 http://secunia.com/advisories/21045 http://secunia.com/advisories/21179 http://secunia.com/advisories/21476 http://secunia.com/advisories/21498 http://secunia.com/advisories/21605 http://secunia.com/advisories/22174 http://support.avaya.com/elmodocs2/security/ASA-2006 • CWE-20: Improper Input Validation •